SlideShare a Scribd company logo
1 of 46
Dr. Bassel Soudan
Microprocessors & Interfacing 1
Chapter 2
Microprocessor Architecture
Dr. Bassel Soudan
Microprocessors & Interfacing 2
Microprocessor Architecture
• The microprocessor can be programmed to
perform functions on given data by writing
specific instructions into its memory.
– The microprocessor reads one instruction at a
time, matches it with its instruction set, and
performs the data manipulation specified.
– The result is either stored back into memory or
displayed on an output device.
Dr. Bassel Soudan
Microprocessors & Interfacing 3
The 8085 Architecture
• The 8085 uses three separate busses to perform
its operations
– The address bus.
– The data bus.
– The control bus.
Dr. Bassel Soudan
Microprocessors & Interfacing 4
The Address Bus
– 16 bits wide (A0 A1…A15)
• Therefore, the 8085 can access locations with numbers
from 0 to 65,536. Or, the 8085 can access a total of 64K
addresses.
– “Unidirectional”.
• Information flows out of the microprocessor and into the
memory or peripherals.
– When the 8085 wants to access a peripheral or a
memory location, it places the 16-bit address on
the address bus and then sends the appropriate
control signals.
Dr. Bassel Soudan
Microprocessors & Interfacing 5
The Data Bus
– 8 bits wide (D0 D1…D7)
– “Bi-directional”.
• Information flows both ways between the microprocessor
and memory or I/O.
– The 8085 uses the data bus to transfer the binary
information.
– Since the data bus has 8-bits only, then the 8085
can manipulate data 8 bits at-a-time only.
Dr. Bassel Soudan
Microprocessors & Interfacing 6
The Control Bus
– There is no real control bus. Instead, the control
bus is made up of a number of single bit control
signals.
Dr. Bassel Soudan
Microprocessors & Interfacing 7
Operation Types in a Microprocessor
• All of the operations of the microprocessor can
be classified into one of three types:
- Microprocessor Initiated Operations
- Internal Operations
- Peripheral Initiated Operations
Dr. Bassel Soudan
Microprocessors & Interfacing 8
Microprocessor Initiated Operations
• These are operations that the microprocessor
itself starts.
• These are usually one of 4 operations:
– Memory Read
– Memory Write
– I/O Read (Get data from an input device)
– I/O write (Send data to an output device)
Dr. Bassel Soudan
Microprocessors & Interfacing 9
Microprocessor Initiated Operations
• It is important to note that the microprocessor
treats memory and I/O devices the same way.
– Input and output devices simply look like memory
locations to the microprocessor.
• For example, the keyboard may look like memory
address A3F2H. To get what key is being pressed, the
microprocessor simply reads the data at location A3F2H.
– The communication process between the
microprocessor and peripheral devices consist of
the following three steps:
– Identify the address.
– Transfer the binary information.
– Provide the right timing signals.
Dr. Bassel Soudan
Microprocessors & Interfacing 10
The Read Operation
– To read the contents of a memory location, the
following steps take place:
• The microprocessor places the 16-bit address of the
memory location on the address bus.
• The microprocessor activates a control signal called
“memory read” which enables the memory chip.
• The memory decodes the address and identifies the right
location.
• The memory places the contents on the data bus.
• The microprocessor reads the value of the data bus after
a certain amount of time.
Dr. Bassel Soudan
Microprocessors & Interfacing 11
Internal Data Operations
• The 8085 can perform a number of internal
operations. Such as: storing data, Arithmetic &
Logic operations, Testing for condition, etc.
– To perform these operations, the microprocessor
needs an internal architecture similar to the
following:
Accumulator Flags
B C
D E
H L
Program Counter
Stack Pointer
Data
Address 8
16
Dr. Bassel Soudan
Microprocessors & Interfacing 12
The Internal Architecture
• We have already discussed the general purpose
registers, the Accumulator, and the flags.
• The Program Counter (PC)
– This is a register that is used to control the
sequencing of the execution of instructions.
– This register always holds the address of the next
instruction.
– Since it holds an address, it must be 16 bits wide.
Dr. Bassel Soudan
Microprocessors & Interfacing 13
The Internal Architecture
• The Stack pointer
– The stack pointer is also a 16-bit register that is
used to point into memory.
– The memory this register points to is a special
area called the stack.
– The stack is an area of memory used to hold data
that will be retreived soon.
– The stack is usually accessed in a Last In First
Out (LIFO) fashion.
Dr. Bassel Soudan
Microprocessors & Interfacing 14
Externally Initiated Operations
• External devices can initiate (start) one of the 4
following operations:
– Reset
• All operations are stopped and the program counter is
reset to 0000.
– Interrupt
• The microprocessor’s operations are interrupted and the
microprocessor executes what is called a “service
routine”.
• This routine “handles” the interrupt, (perform the
necessary operations). Then the microprocessor returns
to its previous operations and continues.
Dr. Bassel Soudan
Microprocessors & Interfacing 15
Externally Initiated Operations
– Ready
• The 8085 has a pin called RDY. This pin is used by
external devices to stop the 8085 until they catch up.
• As long as the RDY pin is low, the 8085 will be in a wait
state.
– Hold
• The 8085 has a pin called HOLD. This pin is used by
external devices to gain control of the busses.
• When the HOLD signal is activated by an external
device, the 8085 stops executing instructions and stops
using the busses.
• This would allow external devices to control the
information on the busses. Example DMA.
Dr. Bassel Soudan
Microprocessors & Interfacing 16
The Design and Operation of Memory
• Memory in a microprocessor system is where
information (data and instructions) is kept. It can
be classified into two main types:
• Main memory (RAM and ROM)
• Storage memory (Disks , CD ROMs, etc.)
– The simple view of RAM is that it is made up of
registers that are made up of flip-flops (or memory
elements).
• The number of flip-flops in a “memory register”
determines the size of the memory word.
– ROM on the other hand uses diodes instead of the
flip-flops to permanently hold the information.
Dr. Bassel Soudan
Microprocessors & Interfacing 17
Accessing Information in Memory
• For the microprocessor to access (Read or Write)
information in memory (RAM or ROM), it needs
to do the following:
– Select the right memory chip (using part of the
address bus).
– Identify the memory location (using the rest of the
address bus).
– Access the data (using the data bus).
Dr. Bassel Soudan
Microprocessors & Interfacing 18
Tri-State Buffers
• An important circuit element that is used
extensively in memory.
• This buffer is a logic circuit that has three states:
– Logic 0, logic1, and high impedance.
– When this circuit is in high impedance mode it
looks as if it is disconnected from the output
completely.
The Output is Low The Output is High High Impedance
Dr. Bassel Soudan
Microprocessors & Interfacing 19
The Tri-State Buffer
• This circuit has two inputs and one output.
– The first input behaves like the normal input for
the circuit.
– The second input is an “enable”.
• If it is set high, the output follows the proper circuit
behavior.
• If it is set low, the output looks like a wire connected to
nothing.
Input Output
Enable
Input Output
Enable
OR
Dr. Bassel Soudan
Microprocessors & Interfacing 2
0
The Basic Memory Element
• The basic memory element is similar to a D latch.
• This latch has an input where the data comes in.
It has an enable input and an output on which
data comes out.
Q
D
EN
Data Input Data Output
Enable
Dr. Bassel Soudan
Microprocessors & Interfacing 21
The Basic Memory Element
• However, this is not safe.
– Data is always present on the input and the output
is always set to the contents of the latch.
– To avoid this, tri-state buffers are added at the
input and output of the latch.
Q
D
EN
Data Input Data Output
Enable
WR RD
Dr. Bassel Soudan
Microprocessors & Interfacing 2
2
The Basic Memory Element
• The WR signal controls the input buffer.
– The bar over WR means that this is an active low
signal.
– So, if WR is 0 the input data reaches the latch
input.
– If WR is 1 the input of the latch looks like a wire
connected to nothing.
• The RD signal controls the output in a similar
manner.
Dr. Bassel Soudan
Microprocessors & Interfacing 2
3
A Memory “Register”
• If we take four of these latches and connect them
together, we would have a 4-bit memory register
WR
RD
EN
Q
D
EN
Q
D
EN
Q
D
EN
Q
D
EN
I0 I1 I2 I3
O0 O1 O2 O3
Dr. Bassel Soudan
Microprocessors & Interfacing 2
4
A group of memory registers
– Expanding on this
scheme to add more
memory registers we get
the diagram to the right.
D
EN
Q D
EN
Q D
EN
Q D
EN
Q
D
EN
Q D
EN
Q D
EN
Q D
EN
Q
D
EN
Q D
EN
Q D
EN
Q D
EN
Q
D
EN
Q D
EN
Q D
EN
Q D
EN
Q
D0 D1 D2 D3
D0 D1 D2 D3
o
o
o
o
o
o
o
o
WR
RD
Dr. Bassel Soudan
Microprocessors & Interfacing 2
5
A group of Memory Registers
– If we represent each memory location (Register)
as a block we get the following
Input Buffers
Output Buffers
Memory Reg. 0
Memory Reg. 1
Memory Reg. 2
Memory Reg. 3
I0 I1 I2 I3
O0 O1 O2 O3
WR
EN0
EN1
EN2
EN3
RD
Dr. Bassel Soudan
Microprocessors & Interfacing 2
6
The Design of a Memory Chip
• Using the RD and WR controls we can determine
the direction of flow either into or out of memory.
Then using the appropriate Enable input we
enable an individual memory register.
• What we have just designed is a memory with 4
locations and each location has 4 elements (bits).
This memory would be called 4 X 4 [Number of
location X number of bits per location].
Dr. Bassel Soudan
Microprocessors & Interfacing 2
7
The Enable Inputs
• How do we produce these enable line?
– Since we can never have more than one of these
enables active at the same time, we can have
them encoded to reduce the number of lines
coming into the chip.
– These encoded lines are the address lines for
memory.
Dr. Bassel Soudan
Microprocessors & Interfacing 2
8
The Design of a Memory Chip
– So, the previous diagram would now look like the
following:
Input Buffers
Output Buffers
Memory Reg. 0
Memory Reg. 1
Memory Reg. 2
Memory Reg. 3
I0 I1 I2 I3
O0 O1 O2 O3
WR
RD
A
d
d
r
e
s
s
D
e
c
o
d
e
r
A1
A0
Dr. Bassel Soudan
Microprocessors & Interfacing 2
9
The Design of a Memory Chip
• Since we have tri-state buffers on both the inputs
and outputs of the flip flops, we can actually use
one set of pins only.
– The chip would now look like this:
Input Buffers
Output Buffers
Memory Reg. 0
Memory Reg. 1
Memory Reg. 2
Memory Reg. 3
WR
RD
A
d
d
r
e
s
s
D
e
c
o
d
e
r
A1
A0
D0
D1
D2
D3
D0
D1
D2
D3
A1
A0
RD WR
Dr. Bassel Soudan
Microprocessors & Interfacing 3
0
The steps of writing into Memory
• What happens when the programmer issues the
STA instruction?
– The microprocessor would turn on the WR control
(WR = 0) and turn off the RD control (RD = 1).
– The address is applied to the address decoder
which generates a single Enable signal to turn on
only one of the memory registers.
– The data is then applied on the data lines and it is
stored into the enabled register.
Dr. Bassel Soudan
Microprocessors & Interfacing 31
Dimensions of Memory
• Memory is usually measured by two numbers: its
length and its width (Length X Width).
• The length is the total number of locations.
• The width is the number of bits in each location.
– The length (total number of locations) is a function
of the number of address lines.
# of memory locations = 2( # of address lines)
• So, a memory chip with 10 address lines would have
210 = 1024 locations (1K)
• Looking at it from the other side, a memory chip with 4K
locations would need
Log2 4096=12 address lines
Dr. Bassel Soudan
Microprocessors & Interfacing 3
2
The 8085 and Memory
• The 8085 has 16 address lines. That means it
can address
216 = 64K memory locations.
– Then it will need 1 memory chip with 64 k
locations, or 2 chips with 32 K in each, or 4 with
16 K each or 16 of the 4 K chips, etc.
• how would we use these address lines to control
the multiple chips?
Dr. Bassel Soudan
Microprocessors & Interfacing 3
3
Chip Select
• Usually, each memory chip has a CS (Chip
Select) input. The chip will only work if an active
signal is applied on that input.
• To allow the use of multiple chips in the make up
of memory, we need to use a number of the
address lines for the purpose of “chip selection”.
– These address lines are decoded to generate the
2n necessary CS inputs for the memory chips to
be used.
Dr. Bassel Soudan
Microprocessors & Interfacing 3
4
Chip Selection Example
– Assume that we need to build a memory system
made up of 4 of the 4 X 4 memory chips we
designed earlier.
– We will need to use 2 inputs and a decoder to
identify which chip will be used at what time.
– The resulting design would now look like the one
on the following slide.
Dr. Bassel Soudan
Microprocessors & Interfacing 3
5
Chip Selection Example
CS
RD WR
A0
A1
CS
RD WR
A0
A1
CS
RD WR
A0
A1
CS
RD WR
A0
A1
2 X4
Decoder
A3
A2
A1
A0
RD
WR
D1
D0
Dr. Bassel Soudan
Microprocessors & Interfacing 3
6
Memory Map and Addresses
• The memory map is a picture representation of
the address range and shows where the different
memory chips are located within the address
range.
0000
FFFF
Address
Range
RAM 1
RAM 2
RAM 3
RAM 4
EPROM
0000
3FFF
4400
5FFF
6000
8FFF
9000
A3FF
A400
F7FF
Address Range of EPROM Chip
Address Range of 1st RAM Chip
Address Range of 2nd RAM Chip
Address Range of 3rd RAM Chip
Address Range of 4th RAM Chip
Dr. Bassel Soudan
Microprocessors & Interfacing 3
7
Address Range of a Memory Chip
• The address range of a particular chip is the list
of all addresses that are mapped to the chip.
– An example for the address range and its
relationship to the memory chips would be the
Post Office Boxes in the post office.
– Each box has its unique number that is assigned
sequentially. (memory locations)
– The boxes are grouped into groups. (memory chips)
– The first box in a group has the number immediately after
the last box in the previous group.
Dr. Bassel Soudan
Microprocessors & Interfacing 3
8
Address Range of a Memory Chip
– The above example can be modified slightly to
make it closer to our discussion on memory.
– Let’s say that this post office has only 1000 boxes.
– Let’s also say that these are grouped into 10 groups of 100
boxes each. Boxes 0000 to 0099 are in group 0, boxes
0100 to 0199 are in group 1 and so on.
– We can look at the box number as if it is made up
of two pieces:
– The group number and the box’s index within the group.
– So, box number 436 is the 36th box in the 4th group.
The upper digit of the box number identifies the group and the
lower two digits identify the box within the group.
Dr. Bassel Soudan
Microprocessors & Interfacing 3
9
The 8085 and Address Ranges
• The 8085 has 16 address lines. So, it can
address a total of 64K memory locations.
– If we use memory chips with 1K locations each,
then we will need 64 such chips.
– The 1K memory chip needs 10 address lines to
uniquely identify the 1K locations. (log2
1024 = 10)
– That leaves 6 address lines which is the exact
number needed for selecting between the 64
different chips (log2
64 = 6).
Dr. Bassel Soudan
Microprocessors & Interfacing 4
0
The 8085 and Address Ranges
• Now, we can break up the 16-bit address of the
8085 into two pieces:
A15 A14 A13 A12 A11 A10 A9 A8 A7 A6 A5 A4 A3 A2 A1 A0
– Depending on the combination on the address lines
A15 - A10 , the address range of the specified chip is
determined.
Location Selection within the Chip
Chip Selection
Dr. Bassel Soudan
Microprocessors & Interfacing 41
Chip Select Example
• A chip that uses the combination A15 - A10 =
001000 would have addresses that range from
2000H to 23FFH.
– Keep in mind that the 10 address lines on the chip gives a range of
00 0000 0000 to 11 1111 1111 or 000H to 3FFH for each of the
chips.
– The memory chip in this example would require the following circuit
on its chip select input:
CS
A10
A11
A12
A13
A14
A15
Dr. Bassel Soudan
Microprocessors & Interfacing 4
2
Chip Select Example
• If we change the above combination to the
following:
– Now the chip would have addresses ranging from:
2400 to 27FF.
– Changing the combination of the address bits
connected to the chip select changes the address
range for the memory chip.
CS
A10
A11
A12
A13
A14
A15
Dr. Bassel Soudan
Microprocessors & Interfacing 4
3
Chip Select Example
– To illustrate this with a picture:
• in the first case, the memory chip occupies the piece of
the memory map identified as before.
• In the second case, it occupies the piece identified as
after.
0000
2000
23FF
FFFF
0000
2400
27FF
FFFF
Before After
Dr. Bassel Soudan
Microprocessors & Interfacing 4
4
High-Order vs. Low-Order Address Lines
• The address lines from a microprocessor can be
classified into two types:
– High-Order
• Used for memory chip selection
– Low-Order
• Used for location selection within a memory chip.
– This classification is highly dependent on the
memory system design.
Dr. Bassel Soudan
Microprocessors & Interfacing 4
5
Data Lines
• All of the above discussion has been regarding
memory length. Lets look at memory width.
• We said that the width is the number of bits in
each memory word.
– We have been assuming so far that our memory
chips have the right width.
– What if they don’t?
• It is very common to find memory chips that have only 4
bits per location. How would you design a byte wide
memory system using these chips?
• We use two chips for the same address range. One chip
will supply 4 of the data bits per address and the other
chip supply the other 4 data bits for the same address.
Dr. Bassel Soudan
Microprocessors & Interfacing 4
6
Data Lines
CS
A0
…
A9
CS CS
D0
…
D3
D4
…
D7

More Related Content

Similar to 8085microprocessorarchitectureppt-121013115356-phpapp02_2.ppt

Microprocessor 8085 Chapter 3
Microprocessor 8085 Chapter 3Microprocessor 8085 Chapter 3
Microprocessor 8085 Chapter 3Rishikesh Bhavsar
 
Unit 2 - Microprocessor & Microcontroller.pptx
Unit 2 -  Microprocessor & Microcontroller.pptxUnit 2 -  Microprocessor & Microcontroller.pptx
Unit 2 - Microprocessor & Microcontroller.pptxCharunnath S V
 
Microprocessor and Application (8085)
Microprocessor and Application (8085)Microprocessor and Application (8085)
Microprocessor and Application (8085)ufaq kk
 
8085 microproceesor ppt
8085 microproceesor ppt8085 microproceesor ppt
8085 microproceesor pptRJ Aniket
 
Part of UNIT2 Memory mapped IOjkl;'lk.pdf
Part of UNIT2 Memory mapped IOjkl;'lk.pdfPart of UNIT2 Memory mapped IOjkl;'lk.pdf
Part of UNIT2 Memory mapped IOjkl;'lk.pdfAbhishekkumar397974
 
Memory & I/O interfacing
Memory & I/O  interfacingMemory & I/O  interfacing
Memory & I/O interfacingdeval patel
 
Pin Configuration.pptx
Pin Configuration.pptxPin Configuration.pptx
Pin Configuration.pptxssuser823c58
 
Microprocessor and Microcontroller lec5
Microprocessor and Microcontroller lec5Microprocessor and Microcontroller lec5
Microprocessor and Microcontroller lec5Ameen San
 
Microprocessors and microcontrollers short answer questions and answers
Microprocessors and microcontrollers short answer questions and answersMicroprocessors and microcontrollers short answer questions and answers
Microprocessors and microcontrollers short answer questions and answersAbhijith Augustine
 
Overview of microcontroller and microprocessor
Overview of microcontroller and microprocessor Overview of microcontroller and microprocessor
Overview of microcontroller and microprocessor Mrunal Deshkar
 
20838382 microprocessor-8085-notes
20838382 microprocessor-8085-notes20838382 microprocessor-8085-notes
20838382 microprocessor-8085-notesRavali Sunki
 

Similar to 8085microprocessorarchitectureppt-121013115356-phpapp02_2.ppt (20)

chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.ppt
 
architect.ppt
architect.pptarchitect.ppt
architect.ppt
 
Microprocessor 8085 Chapter 3
Microprocessor 8085 Chapter 3Microprocessor 8085 Chapter 3
Microprocessor 8085 Chapter 3
 
12 mt06ped001
12 mt06ped001 12 mt06ped001
12 mt06ped001
 
MP_MC.pdf
MP_MC.pdfMP_MC.pdf
MP_MC.pdf
 
Unit 2 - Microprocessor & Microcontroller.pptx
Unit 2 -  Microprocessor & Microcontroller.pptxUnit 2 -  Microprocessor & Microcontroller.pptx
Unit 2 - Microprocessor & Microcontroller.pptx
 
Mechatronics ME8791
Mechatronics ME8791 Mechatronics ME8791
Mechatronics ME8791
 
Microprocessor and Application (8085)
Microprocessor and Application (8085)Microprocessor and Application (8085)
Microprocessor and Application (8085)
 
8085 microproceesor ppt
8085 microproceesor ppt8085 microproceesor ppt
8085 microproceesor ppt
 
Unit 2.ppt
Unit 2.pptUnit 2.ppt
Unit 2.ppt
 
Introduction to 8085svv
Introduction to 8085svvIntroduction to 8085svv
Introduction to 8085svv
 
Part of UNIT2 Memory mapped IOjkl;'lk.pdf
Part of UNIT2 Memory mapped IOjkl;'lk.pdfPart of UNIT2 Memory mapped IOjkl;'lk.pdf
Part of UNIT2 Memory mapped IOjkl;'lk.pdf
 
Memory & I/O interfacing
Memory & I/O  interfacingMemory & I/O  interfacing
Memory & I/O interfacing
 
Pin Configuration.pptx
Pin Configuration.pptxPin Configuration.pptx
Pin Configuration.pptx
 
Mp 8085
Mp 8085Mp 8085
Mp 8085
 
Microprocessor and Microcontroller lec5
Microprocessor and Microcontroller lec5Microprocessor and Microcontroller lec5
Microprocessor and Microcontroller lec5
 
Introduction to 8085 by Adi PPT.pdf
Introduction to 8085 by Adi PPT.pdfIntroduction to 8085 by Adi PPT.pdf
Introduction to 8085 by Adi PPT.pdf
 
Microprocessors and microcontrollers short answer questions and answers
Microprocessors and microcontrollers short answer questions and answersMicroprocessors and microcontrollers short answer questions and answers
Microprocessors and microcontrollers short answer questions and answers
 
Overview of microcontroller and microprocessor
Overview of microcontroller and microprocessor Overview of microcontroller and microprocessor
Overview of microcontroller and microprocessor
 
20838382 microprocessor-8085-notes
20838382 microprocessor-8085-notes20838382 microprocessor-8085-notes
20838382 microprocessor-8085-notes
 

More from jeronimored

Computer Networks 7.Physical LayerComputer Networks 7.Physical Layer
Computer Networks 7.Physical LayerComputer Networks 7.Physical LayerComputer Networks 7.Physical LayerComputer Networks 7.Physical Layer
Computer Networks 7.Physical LayerComputer Networks 7.Physical Layerjeronimored
 
Android – Open source mobile OS developed ny the Open Handset Alliance led by...
Android – Open source mobile OS developed ny the Open Handset Alliance led by...Android – Open source mobile OS developed ny the Open Handset Alliance led by...
Android – Open source mobile OS developed ny the Open Handset Alliance led by...jeronimored
 
Intel microprocessor history lec12_x86arch.ppt
Intel microprocessor history lec12_x86arch.pptIntel microprocessor history lec12_x86arch.ppt
Intel microprocessor history lec12_x86arch.pptjeronimored
 
Intro Ch 01BA business alliance consisting of 47 companies to develop open st...
Intro Ch 01BA business alliance consisting of 47 companies to develop open st...Intro Ch 01BA business alliance consisting of 47 companies to develop open st...
Intro Ch 01BA business alliance consisting of 47 companies to develop open st...jeronimored
 
preKnowledge-InternetNetworking Android's mobile operating system is based on...
preKnowledge-InternetNetworking Android's mobile operating system is based on...preKnowledge-InternetNetworking Android's mobile operating system is based on...
preKnowledge-InternetNetworking Android's mobile operating system is based on...jeronimored
 
TelecommunicationsThe Internet Basic Telecom Model
TelecommunicationsThe Internet Basic Telecom ModelTelecommunicationsThe Internet Basic Telecom Model
TelecommunicationsThe Internet Basic Telecom Modeljeronimored
 
Functional Areas of Network Management Configuration Management
Functional Areas of Network Management Configuration ManagementFunctional Areas of Network Management Configuration Management
Functional Areas of Network Management Configuration Managementjeronimored
 
Coding, Information Theory (and Advanced Modulation
Coding, Information Theory (and Advanced ModulationCoding, Information Theory (and Advanced Modulation
Coding, Information Theory (and Advanced Modulationjeronimored
 
A microprocessor is the main component of a microcomputer system and is also ...
A microprocessor is the main component of a microcomputer system and is also ...A microprocessor is the main component of a microcomputer system and is also ...
A microprocessor is the main component of a microcomputer system and is also ...jeronimored
 
Erroneous co-routines can block system Formal interfaces slow down system
Erroneous co-routines can block system Formal  interfaces slow down systemErroneous co-routines can block system Formal  interfaces slow down system
Erroneous co-routines can block system Formal interfaces slow down systemjeronimored
 
Welcome to Introduction to Algorithms, Spring 2004
Welcome to Introduction to Algorithms, Spring 2004Welcome to Introduction to Algorithms, Spring 2004
Welcome to Introduction to Algorithms, Spring 2004jeronimored
 
Resource Management in (Embedded) Real-Time Systems
Resource Management in (Embedded) Real-Time SystemsResource Management in (Embedded) Real-Time Systems
Resource Management in (Embedded) Real-Time Systemsjeronimored
 
Management Tools Desirable features Management Architectures Simple Network ...
Management Tools  Desirable features Management Architectures Simple Network ...Management Tools  Desirable features Management Architectures Simple Network ...
Management Tools Desirable features Management Architectures Simple Network ...jeronimored
 
MICMicrowave Tubes – klystron, reflex klystron, magnetron and TWT.
MICMicrowave Tubes – klystron, reflex klystron, magnetron and TWT.MICMicrowave Tubes – klystron, reflex klystron, magnetron and TWT.
MICMicrowave Tubes – klystron, reflex klystron, magnetron and TWT.jeronimored
 
Network Management Network Management Model
Network Management Network Management ModelNetwork Management Network Management Model
Network Management Network Management Modeljeronimored
 
Saumya Debray The University of Arizona Tucson
Saumya Debray The University of Arizona TucsonSaumya Debray The University of Arizona Tucson
Saumya Debray The University of Arizona Tucsonjeronimored
 
An operating system (OS) provides a virtual execution environment on top of h...
An operating system (OS) provides a virtual execution environment on top of h...An operating system (OS) provides a virtual execution environment on top of h...
An operating system (OS) provides a virtual execution environment on top of h...jeronimored
 
application Fundamentals Android Introduction
application Fundamentals  Android Introductionapplication Fundamentals  Android Introduction
application Fundamentals Android Introductionjeronimored
 
linux-lecture1.ppt
linux-lecture1.pptlinux-lecture1.ppt
linux-lecture1.pptjeronimored
 
5 - System Administration.ppt
5 - System Administration.ppt5 - System Administration.ppt
5 - System Administration.pptjeronimored
 

More from jeronimored (20)

Computer Networks 7.Physical LayerComputer Networks 7.Physical Layer
Computer Networks 7.Physical LayerComputer Networks 7.Physical LayerComputer Networks 7.Physical LayerComputer Networks 7.Physical Layer
Computer Networks 7.Physical LayerComputer Networks 7.Physical Layer
 
Android – Open source mobile OS developed ny the Open Handset Alliance led by...
Android – Open source mobile OS developed ny the Open Handset Alliance led by...Android – Open source mobile OS developed ny the Open Handset Alliance led by...
Android – Open source mobile OS developed ny the Open Handset Alliance led by...
 
Intel microprocessor history lec12_x86arch.ppt
Intel microprocessor history lec12_x86arch.pptIntel microprocessor history lec12_x86arch.ppt
Intel microprocessor history lec12_x86arch.ppt
 
Intro Ch 01BA business alliance consisting of 47 companies to develop open st...
Intro Ch 01BA business alliance consisting of 47 companies to develop open st...Intro Ch 01BA business alliance consisting of 47 companies to develop open st...
Intro Ch 01BA business alliance consisting of 47 companies to develop open st...
 
preKnowledge-InternetNetworking Android's mobile operating system is based on...
preKnowledge-InternetNetworking Android's mobile operating system is based on...preKnowledge-InternetNetworking Android's mobile operating system is based on...
preKnowledge-InternetNetworking Android's mobile operating system is based on...
 
TelecommunicationsThe Internet Basic Telecom Model
TelecommunicationsThe Internet Basic Telecom ModelTelecommunicationsThe Internet Basic Telecom Model
TelecommunicationsThe Internet Basic Telecom Model
 
Functional Areas of Network Management Configuration Management
Functional Areas of Network Management Configuration ManagementFunctional Areas of Network Management Configuration Management
Functional Areas of Network Management Configuration Management
 
Coding, Information Theory (and Advanced Modulation
Coding, Information Theory (and Advanced ModulationCoding, Information Theory (and Advanced Modulation
Coding, Information Theory (and Advanced Modulation
 
A microprocessor is the main component of a microcomputer system and is also ...
A microprocessor is the main component of a microcomputer system and is also ...A microprocessor is the main component of a microcomputer system and is also ...
A microprocessor is the main component of a microcomputer system and is also ...
 
Erroneous co-routines can block system Formal interfaces slow down system
Erroneous co-routines can block system Formal  interfaces slow down systemErroneous co-routines can block system Formal  interfaces slow down system
Erroneous co-routines can block system Formal interfaces slow down system
 
Welcome to Introduction to Algorithms, Spring 2004
Welcome to Introduction to Algorithms, Spring 2004Welcome to Introduction to Algorithms, Spring 2004
Welcome to Introduction to Algorithms, Spring 2004
 
Resource Management in (Embedded) Real-Time Systems
Resource Management in (Embedded) Real-Time SystemsResource Management in (Embedded) Real-Time Systems
Resource Management in (Embedded) Real-Time Systems
 
Management Tools Desirable features Management Architectures Simple Network ...
Management Tools  Desirable features Management Architectures Simple Network ...Management Tools  Desirable features Management Architectures Simple Network ...
Management Tools Desirable features Management Architectures Simple Network ...
 
MICMicrowave Tubes – klystron, reflex klystron, magnetron and TWT.
MICMicrowave Tubes – klystron, reflex klystron, magnetron and TWT.MICMicrowave Tubes – klystron, reflex klystron, magnetron and TWT.
MICMicrowave Tubes – klystron, reflex klystron, magnetron and TWT.
 
Network Management Network Management Model
Network Management Network Management ModelNetwork Management Network Management Model
Network Management Network Management Model
 
Saumya Debray The University of Arizona Tucson
Saumya Debray The University of Arizona TucsonSaumya Debray The University of Arizona Tucson
Saumya Debray The University of Arizona Tucson
 
An operating system (OS) provides a virtual execution environment on top of h...
An operating system (OS) provides a virtual execution environment on top of h...An operating system (OS) provides a virtual execution environment on top of h...
An operating system (OS) provides a virtual execution environment on top of h...
 
application Fundamentals Android Introduction
application Fundamentals  Android Introductionapplication Fundamentals  Android Introduction
application Fundamentals Android Introduction
 
linux-lecture1.ppt
linux-lecture1.pptlinux-lecture1.ppt
linux-lecture1.ppt
 
5 - System Administration.ppt
5 - System Administration.ppt5 - System Administration.ppt
5 - System Administration.ppt
 

Recently uploaded

Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 

Recently uploaded (20)

Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 

8085microprocessorarchitectureppt-121013115356-phpapp02_2.ppt

  • 1. Dr. Bassel Soudan Microprocessors & Interfacing 1 Chapter 2 Microprocessor Architecture
  • 2. Dr. Bassel Soudan Microprocessors & Interfacing 2 Microprocessor Architecture • The microprocessor can be programmed to perform functions on given data by writing specific instructions into its memory. – The microprocessor reads one instruction at a time, matches it with its instruction set, and performs the data manipulation specified. – The result is either stored back into memory or displayed on an output device.
  • 3. Dr. Bassel Soudan Microprocessors & Interfacing 3 The 8085 Architecture • The 8085 uses three separate busses to perform its operations – The address bus. – The data bus. – The control bus.
  • 4. Dr. Bassel Soudan Microprocessors & Interfacing 4 The Address Bus – 16 bits wide (A0 A1…A15) • Therefore, the 8085 can access locations with numbers from 0 to 65,536. Or, the 8085 can access a total of 64K addresses. – “Unidirectional”. • Information flows out of the microprocessor and into the memory or peripherals. – When the 8085 wants to access a peripheral or a memory location, it places the 16-bit address on the address bus and then sends the appropriate control signals.
  • 5. Dr. Bassel Soudan Microprocessors & Interfacing 5 The Data Bus – 8 bits wide (D0 D1…D7) – “Bi-directional”. • Information flows both ways between the microprocessor and memory or I/O. – The 8085 uses the data bus to transfer the binary information. – Since the data bus has 8-bits only, then the 8085 can manipulate data 8 bits at-a-time only.
  • 6. Dr. Bassel Soudan Microprocessors & Interfacing 6 The Control Bus – There is no real control bus. Instead, the control bus is made up of a number of single bit control signals.
  • 7. Dr. Bassel Soudan Microprocessors & Interfacing 7 Operation Types in a Microprocessor • All of the operations of the microprocessor can be classified into one of three types: - Microprocessor Initiated Operations - Internal Operations - Peripheral Initiated Operations
  • 8. Dr. Bassel Soudan Microprocessors & Interfacing 8 Microprocessor Initiated Operations • These are operations that the microprocessor itself starts. • These are usually one of 4 operations: – Memory Read – Memory Write – I/O Read (Get data from an input device) – I/O write (Send data to an output device)
  • 9. Dr. Bassel Soudan Microprocessors & Interfacing 9 Microprocessor Initiated Operations • It is important to note that the microprocessor treats memory and I/O devices the same way. – Input and output devices simply look like memory locations to the microprocessor. • For example, the keyboard may look like memory address A3F2H. To get what key is being pressed, the microprocessor simply reads the data at location A3F2H. – The communication process between the microprocessor and peripheral devices consist of the following three steps: – Identify the address. – Transfer the binary information. – Provide the right timing signals.
  • 10. Dr. Bassel Soudan Microprocessors & Interfacing 10 The Read Operation – To read the contents of a memory location, the following steps take place: • The microprocessor places the 16-bit address of the memory location on the address bus. • The microprocessor activates a control signal called “memory read” which enables the memory chip. • The memory decodes the address and identifies the right location. • The memory places the contents on the data bus. • The microprocessor reads the value of the data bus after a certain amount of time.
  • 11. Dr. Bassel Soudan Microprocessors & Interfacing 11 Internal Data Operations • The 8085 can perform a number of internal operations. Such as: storing data, Arithmetic & Logic operations, Testing for condition, etc. – To perform these operations, the microprocessor needs an internal architecture similar to the following: Accumulator Flags B C D E H L Program Counter Stack Pointer Data Address 8 16
  • 12. Dr. Bassel Soudan Microprocessors & Interfacing 12 The Internal Architecture • We have already discussed the general purpose registers, the Accumulator, and the flags. • The Program Counter (PC) – This is a register that is used to control the sequencing of the execution of instructions. – This register always holds the address of the next instruction. – Since it holds an address, it must be 16 bits wide.
  • 13. Dr. Bassel Soudan Microprocessors & Interfacing 13 The Internal Architecture • The Stack pointer – The stack pointer is also a 16-bit register that is used to point into memory. – The memory this register points to is a special area called the stack. – The stack is an area of memory used to hold data that will be retreived soon. – The stack is usually accessed in a Last In First Out (LIFO) fashion.
  • 14. Dr. Bassel Soudan Microprocessors & Interfacing 14 Externally Initiated Operations • External devices can initiate (start) one of the 4 following operations: – Reset • All operations are stopped and the program counter is reset to 0000. – Interrupt • The microprocessor’s operations are interrupted and the microprocessor executes what is called a “service routine”. • This routine “handles” the interrupt, (perform the necessary operations). Then the microprocessor returns to its previous operations and continues.
  • 15. Dr. Bassel Soudan Microprocessors & Interfacing 15 Externally Initiated Operations – Ready • The 8085 has a pin called RDY. This pin is used by external devices to stop the 8085 until they catch up. • As long as the RDY pin is low, the 8085 will be in a wait state. – Hold • The 8085 has a pin called HOLD. This pin is used by external devices to gain control of the busses. • When the HOLD signal is activated by an external device, the 8085 stops executing instructions and stops using the busses. • This would allow external devices to control the information on the busses. Example DMA.
  • 16. Dr. Bassel Soudan Microprocessors & Interfacing 16 The Design and Operation of Memory • Memory in a microprocessor system is where information (data and instructions) is kept. It can be classified into two main types: • Main memory (RAM and ROM) • Storage memory (Disks , CD ROMs, etc.) – The simple view of RAM is that it is made up of registers that are made up of flip-flops (or memory elements). • The number of flip-flops in a “memory register” determines the size of the memory word. – ROM on the other hand uses diodes instead of the flip-flops to permanently hold the information.
  • 17. Dr. Bassel Soudan Microprocessors & Interfacing 17 Accessing Information in Memory • For the microprocessor to access (Read or Write) information in memory (RAM or ROM), it needs to do the following: – Select the right memory chip (using part of the address bus). – Identify the memory location (using the rest of the address bus). – Access the data (using the data bus).
  • 18. Dr. Bassel Soudan Microprocessors & Interfacing 18 Tri-State Buffers • An important circuit element that is used extensively in memory. • This buffer is a logic circuit that has three states: – Logic 0, logic1, and high impedance. – When this circuit is in high impedance mode it looks as if it is disconnected from the output completely. The Output is Low The Output is High High Impedance
  • 19. Dr. Bassel Soudan Microprocessors & Interfacing 19 The Tri-State Buffer • This circuit has two inputs and one output. – The first input behaves like the normal input for the circuit. – The second input is an “enable”. • If it is set high, the output follows the proper circuit behavior. • If it is set low, the output looks like a wire connected to nothing. Input Output Enable Input Output Enable OR
  • 20. Dr. Bassel Soudan Microprocessors & Interfacing 2 0 The Basic Memory Element • The basic memory element is similar to a D latch. • This latch has an input where the data comes in. It has an enable input and an output on which data comes out. Q D EN Data Input Data Output Enable
  • 21. Dr. Bassel Soudan Microprocessors & Interfacing 21 The Basic Memory Element • However, this is not safe. – Data is always present on the input and the output is always set to the contents of the latch. – To avoid this, tri-state buffers are added at the input and output of the latch. Q D EN Data Input Data Output Enable WR RD
  • 22. Dr. Bassel Soudan Microprocessors & Interfacing 2 2 The Basic Memory Element • The WR signal controls the input buffer. – The bar over WR means that this is an active low signal. – So, if WR is 0 the input data reaches the latch input. – If WR is 1 the input of the latch looks like a wire connected to nothing. • The RD signal controls the output in a similar manner.
  • 23. Dr. Bassel Soudan Microprocessors & Interfacing 2 3 A Memory “Register” • If we take four of these latches and connect them together, we would have a 4-bit memory register WR RD EN Q D EN Q D EN Q D EN Q D EN I0 I1 I2 I3 O0 O1 O2 O3
  • 24. Dr. Bassel Soudan Microprocessors & Interfacing 2 4 A group of memory registers – Expanding on this scheme to add more memory registers we get the diagram to the right. D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D0 D1 D2 D3 D0 D1 D2 D3 o o o o o o o o WR RD
  • 25. Dr. Bassel Soudan Microprocessors & Interfacing 2 5 A group of Memory Registers – If we represent each memory location (Register) as a block we get the following Input Buffers Output Buffers Memory Reg. 0 Memory Reg. 1 Memory Reg. 2 Memory Reg. 3 I0 I1 I2 I3 O0 O1 O2 O3 WR EN0 EN1 EN2 EN3 RD
  • 26. Dr. Bassel Soudan Microprocessors & Interfacing 2 6 The Design of a Memory Chip • Using the RD and WR controls we can determine the direction of flow either into or out of memory. Then using the appropriate Enable input we enable an individual memory register. • What we have just designed is a memory with 4 locations and each location has 4 elements (bits). This memory would be called 4 X 4 [Number of location X number of bits per location].
  • 27. Dr. Bassel Soudan Microprocessors & Interfacing 2 7 The Enable Inputs • How do we produce these enable line? – Since we can never have more than one of these enables active at the same time, we can have them encoded to reduce the number of lines coming into the chip. – These encoded lines are the address lines for memory.
  • 28. Dr. Bassel Soudan Microprocessors & Interfacing 2 8 The Design of a Memory Chip – So, the previous diagram would now look like the following: Input Buffers Output Buffers Memory Reg. 0 Memory Reg. 1 Memory Reg. 2 Memory Reg. 3 I0 I1 I2 I3 O0 O1 O2 O3 WR RD A d d r e s s D e c o d e r A1 A0
  • 29. Dr. Bassel Soudan Microprocessors & Interfacing 2 9 The Design of a Memory Chip • Since we have tri-state buffers on both the inputs and outputs of the flip flops, we can actually use one set of pins only. – The chip would now look like this: Input Buffers Output Buffers Memory Reg. 0 Memory Reg. 1 Memory Reg. 2 Memory Reg. 3 WR RD A d d r e s s D e c o d e r A1 A0 D0 D1 D2 D3 D0 D1 D2 D3 A1 A0 RD WR
  • 30. Dr. Bassel Soudan Microprocessors & Interfacing 3 0 The steps of writing into Memory • What happens when the programmer issues the STA instruction? – The microprocessor would turn on the WR control (WR = 0) and turn off the RD control (RD = 1). – The address is applied to the address decoder which generates a single Enable signal to turn on only one of the memory registers. – The data is then applied on the data lines and it is stored into the enabled register.
  • 31. Dr. Bassel Soudan Microprocessors & Interfacing 31 Dimensions of Memory • Memory is usually measured by two numbers: its length and its width (Length X Width). • The length is the total number of locations. • The width is the number of bits in each location. – The length (total number of locations) is a function of the number of address lines. # of memory locations = 2( # of address lines) • So, a memory chip with 10 address lines would have 210 = 1024 locations (1K) • Looking at it from the other side, a memory chip with 4K locations would need Log2 4096=12 address lines
  • 32. Dr. Bassel Soudan Microprocessors & Interfacing 3 2 The 8085 and Memory • The 8085 has 16 address lines. That means it can address 216 = 64K memory locations. – Then it will need 1 memory chip with 64 k locations, or 2 chips with 32 K in each, or 4 with 16 K each or 16 of the 4 K chips, etc. • how would we use these address lines to control the multiple chips?
  • 33. Dr. Bassel Soudan Microprocessors & Interfacing 3 3 Chip Select • Usually, each memory chip has a CS (Chip Select) input. The chip will only work if an active signal is applied on that input. • To allow the use of multiple chips in the make up of memory, we need to use a number of the address lines for the purpose of “chip selection”. – These address lines are decoded to generate the 2n necessary CS inputs for the memory chips to be used.
  • 34. Dr. Bassel Soudan Microprocessors & Interfacing 3 4 Chip Selection Example – Assume that we need to build a memory system made up of 4 of the 4 X 4 memory chips we designed earlier. – We will need to use 2 inputs and a decoder to identify which chip will be used at what time. – The resulting design would now look like the one on the following slide.
  • 35. Dr. Bassel Soudan Microprocessors & Interfacing 3 5 Chip Selection Example CS RD WR A0 A1 CS RD WR A0 A1 CS RD WR A0 A1 CS RD WR A0 A1 2 X4 Decoder A3 A2 A1 A0 RD WR D1 D0
  • 36. Dr. Bassel Soudan Microprocessors & Interfacing 3 6 Memory Map and Addresses • The memory map is a picture representation of the address range and shows where the different memory chips are located within the address range. 0000 FFFF Address Range RAM 1 RAM 2 RAM 3 RAM 4 EPROM 0000 3FFF 4400 5FFF 6000 8FFF 9000 A3FF A400 F7FF Address Range of EPROM Chip Address Range of 1st RAM Chip Address Range of 2nd RAM Chip Address Range of 3rd RAM Chip Address Range of 4th RAM Chip
  • 37. Dr. Bassel Soudan Microprocessors & Interfacing 3 7 Address Range of a Memory Chip • The address range of a particular chip is the list of all addresses that are mapped to the chip. – An example for the address range and its relationship to the memory chips would be the Post Office Boxes in the post office. – Each box has its unique number that is assigned sequentially. (memory locations) – The boxes are grouped into groups. (memory chips) – The first box in a group has the number immediately after the last box in the previous group.
  • 38. Dr. Bassel Soudan Microprocessors & Interfacing 3 8 Address Range of a Memory Chip – The above example can be modified slightly to make it closer to our discussion on memory. – Let’s say that this post office has only 1000 boxes. – Let’s also say that these are grouped into 10 groups of 100 boxes each. Boxes 0000 to 0099 are in group 0, boxes 0100 to 0199 are in group 1 and so on. – We can look at the box number as if it is made up of two pieces: – The group number and the box’s index within the group. – So, box number 436 is the 36th box in the 4th group. The upper digit of the box number identifies the group and the lower two digits identify the box within the group.
  • 39. Dr. Bassel Soudan Microprocessors & Interfacing 3 9 The 8085 and Address Ranges • The 8085 has 16 address lines. So, it can address a total of 64K memory locations. – If we use memory chips with 1K locations each, then we will need 64 such chips. – The 1K memory chip needs 10 address lines to uniquely identify the 1K locations. (log2 1024 = 10) – That leaves 6 address lines which is the exact number needed for selecting between the 64 different chips (log2 64 = 6).
  • 40. Dr. Bassel Soudan Microprocessors & Interfacing 4 0 The 8085 and Address Ranges • Now, we can break up the 16-bit address of the 8085 into two pieces: A15 A14 A13 A12 A11 A10 A9 A8 A7 A6 A5 A4 A3 A2 A1 A0 – Depending on the combination on the address lines A15 - A10 , the address range of the specified chip is determined. Location Selection within the Chip Chip Selection
  • 41. Dr. Bassel Soudan Microprocessors & Interfacing 41 Chip Select Example • A chip that uses the combination A15 - A10 = 001000 would have addresses that range from 2000H to 23FFH. – Keep in mind that the 10 address lines on the chip gives a range of 00 0000 0000 to 11 1111 1111 or 000H to 3FFH for each of the chips. – The memory chip in this example would require the following circuit on its chip select input: CS A10 A11 A12 A13 A14 A15
  • 42. Dr. Bassel Soudan Microprocessors & Interfacing 4 2 Chip Select Example • If we change the above combination to the following: – Now the chip would have addresses ranging from: 2400 to 27FF. – Changing the combination of the address bits connected to the chip select changes the address range for the memory chip. CS A10 A11 A12 A13 A14 A15
  • 43. Dr. Bassel Soudan Microprocessors & Interfacing 4 3 Chip Select Example – To illustrate this with a picture: • in the first case, the memory chip occupies the piece of the memory map identified as before. • In the second case, it occupies the piece identified as after. 0000 2000 23FF FFFF 0000 2400 27FF FFFF Before After
  • 44. Dr. Bassel Soudan Microprocessors & Interfacing 4 4 High-Order vs. Low-Order Address Lines • The address lines from a microprocessor can be classified into two types: – High-Order • Used for memory chip selection – Low-Order • Used for location selection within a memory chip. – This classification is highly dependent on the memory system design.
  • 45. Dr. Bassel Soudan Microprocessors & Interfacing 4 5 Data Lines • All of the above discussion has been regarding memory length. Lets look at memory width. • We said that the width is the number of bits in each memory word. – We have been assuming so far that our memory chips have the right width. – What if they don’t? • It is very common to find memory chips that have only 4 bits per location. How would you design a byte wide memory system using these chips? • We use two chips for the same address range. One chip will supply 4 of the data bits per address and the other chip supply the other 4 data bits for the same address.
  • 46. Dr. Bassel Soudan Microprocessors & Interfacing 4 6 Data Lines CS A0 … A9 CS CS D0 … D3 D4 … D7